Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Deep AI enabled ubiquitous wireless sensing: A survey
With the development of the Internet of Things (IoT), many kinds of wireless signals (eg, Wi-
Fi, LoRa, RFID) are filling our living and working spaces nowadays. Beyond communication …
Fi, LoRa, RFID) are filling our living and working spaces nowadays. Beyond communication …
Safeear: Content privacy-preserving audio deepfake detection
Text-to-Speech (TTS) and Voice Conversion (VC) models have exhibited remarkable
performance in generating realistic and natural audio. However, their dark side, audio …
performance in generating realistic and natural audio. However, their dark side, audio …
" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …
Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …
authentication scenarios, voiceprint-based authentication has become one of the prevalent …
WavoID: Robust and secure multi-modal user identification via mmWave-voice mechanism
With the increasing deployment of voice-controlled devices in homes and enterprises, there
is an urgent demand for voice identification to prevent unauthorized access to sensitive …
is an urgent demand for voice identification to prevent unauthorized access to sensitive …
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …
become an increasing public concern. Existing studies have designed a set of machine …